Abstract--The second round of the NIST-run public competition is underway to find a new hash algorithm(s) for inclusion in the NIST Secure Hash Standard (SHA-3). This paper present...
Brian Baldwin, Andrew Byrne, Liang Lu, Mark Hamilt...
We propose an adaptive transmission technique for optical wireless (OW) systems, operating in atmospheric turbulence and employing subcarrier phase shift keying (S-PSK) intensity m...
Nestor D. Chatzidiamantis, Athanasios S. Lioumpas,...
Interactions with virtual worlds using the sense of touch, called haptic rendering, have natural applications in many domains such as health or industry. For an accurate and realis...
Abstract--There has been growing interest in creating intelligent agents in virtual worlds that do not follow fixed scripts predefined by the developers, but react accordingly base...
The major gain in video coding applications compared to single image coding is the use of temporal prediction, which exploits the correlation between adjacent frames. However, in ...
Eugen Wige, Peter Amon, Andreas Hutter, Andr&eacut...